2 | Patch Release Note |
Features in 86241-02
Patch
PCR: 02103 | Module: SWI | Network affecting: No |
IPX traffic passing between two switch instances using VLAN for Rapier48 now operates correctly.
PCR: 02210 | Module: DNS Relay | Network affecting: No |
Buffer leaks occurred when DNS relay was enabled. This issue has been resolved.
PCR: 02214 | Module: IPG | Network affecting: No |
A buffer leak occurred when a large number of flows (over 4000) were in use and needed to be recycled. This issue has been resolved.
PCR: 02220 | Module: SWI | Network affecting: No |
The EPORT parameter in the ADD SWITCH L3FILTER ENTRY and SET SWITCH L3FILTER ENTRY commands was matching multicast and broadcast packets with software filtering. This issue has been resolved.
PCR: 02236 | Module: FIREWALL | Network affecting: No |
Sometimes the retransmission of an FTP packet was not permitted through the Firewall. This issue has been resolved.
PCR: 02245 | Module: VRRP | Network affecting: No |
VRRP returned an incorrect MAC address for an ARP request. This issue has been resolved.
PCR: 02263 | Module: VRRP | Network affecting: No |
The virtual MAC address was used as the source MAC for all packets forwarded on an interface associated with a Virtual Router (VR). This was confusing when multiple VRs were defined over the same interface because only one virtual MAC address was ever used. The other virtual MAC addresses (for the other VR's) were only used if the source IP address matched the VR’s IP address. To avoid this confusion, the system MAC address is now always used unless the source IP address of the packet is the same as the VR’s IP address.
PCR: 02267 | Module: BGP | Network affecting: No |
When route aggregation was enabled, the atomic aggregate was not being set. This issue has been resolved.
PCR: 02268 | Module: FIREWALL | Network affecting: No |
HTTP requests from a fixed IP address were erroneously reported as a host scan attack in the Firewall deny queue. This issue has been resolved.
Patch